Results 61 to 70 of about 120,111 (165)

Fairly verifiable multi-user homomorphic proxy re-encryption scheme

open access: yesTongxin xuebao
To address the challenges of multi-user ciphertext sharing and secure fair computation in untrusted cloud environments where traditional fully homomorphic encryption algorithms prove inadequate, a verifiable identity-based multi-user homomorphic proxy re-
HOU Jinqiu   +3 more
doaj  

Correcting a delegation protocol for grids [PDF]

open access: yes, 2011
B. Aziz   +6 more
core   +1 more source

Threshold Proxy Re-signature Scheme with Privacy [PDF]

open access: yesInternational Journal of Computer and Electrical Engineering, 2013
Kuan-Yu Chen, Hsi-Chung Lin
openaire   +1 more source

An Identity Based Proxy Re-Signature Scheme [PDF]

open access: yesInternational Journal of Engineering and Technology, 2012
openaire   +1 more source

Unidirectional Multiple-times Proxy Re-signature Scheme

open access: yesInformation Technology Journal, 2013
Xuan Hong, Jianhua Gao, Zhongmei Wan
openaire   +1 more source

ID-based bidirectional threshold proxy re-signature

open access: yesJournal of Computer Applications, 2011
Yu-lei ZHANG   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy